Opportunistic key management in delay tolerant networks

Authors: Menesidou, S. and Katos, V.

http://eprints.bournemouth.ac.uk/24342/

Journal: Int. J. of Information and Computer Security

This source preferred by Vasilis Katos

This data was imported from Scopus:

Authors: Menesidou, S.A. and Katos, V.

http://eprints.bournemouth.ac.uk/24342/

Journal: International Journal of Information and Computer Security

Volume: 9

Issue: 3

Pages: 212-228

eISSN: 1744-1773

ISSN: 1744-1765

DOI: 10.1504/IJICS.2017.085136

Copyright © 2017 Inderscience Enterprises Ltd. Key management is considered to be a challenging task in delay tolerant networks (DTNs) operating in environments with adverse communication conditions such as space, due to the practical limitations and constraints prohibiting effective closed-loop communications. In this paper, we propose opportunistic key management as a more suitable solution for key management in networks requiring opportunistic behaviour. We show that opportunistic key management is better exploited and utilised when used in conjunction with routing decisions by security aware DTN nodes.

The data on this page was last updated at 04:45 on January 16, 2018.